Research explorer tool

7 results

On privacy aware carriers for value-possessed e-invoices considering intelligence mining

Journal Article
Cha, S., Wang, H., Tan, Z., Joung, Y., Tseng, Y., & Yeh, K. (2020)
On privacy aware carriers for value-possessed e-invoices considering intelligence mining. IEEE Transactions on Emerging Topics in Computational Intelligence, 4(5), 641-652. https://doi.org/10.1109/TETCI.2019.2938547
Intelligence mining is one of the most promising technologies for effectively extracting intelligence (and knowledge) to enhance the quality of decision-making. In Taiwan, the...

Deep learning based emotion analysis of microblog texts

Journal Article
Xu, D., Tian, Z., Lai, R., Kong, X., Tan, Z., & Shi, W. (2020)
Deep learning based emotion analysis of microblog texts. Information Fusion, 64, 1-11. https://doi.org/10.1016/j.inffus.2020.06.002
Traditional text emotion analysis methods are primarily devoted to studying extended texts, such as news reports and full-length documents. Microblogs are considered short tex...

Exploring coupled images fusion based on joint tensor decomposition

Journal Article
Lu, L., Ren, X., Yeh, K., Tan, Z., & Chanussot, J. (2020)
Exploring coupled images fusion based on joint tensor decomposition. Human-Centric Computing and Information Sciences, 10, https://doi.org/10.1186/s13673-020-00215-z
Data fusion has always been a hot research topic in human-centric computing and extended with the development of artificial intelligence. Generally, the coupled data fusion al...

Reviving legacy enterprise systems with microservice-based architecture within cloud environments

Conference Proceeding
Habibullah, S., Liu, X., Tan, Z., Zhang, Y., & Liu, Q. (2019)
Reviving legacy enterprise systems with microservice-based architecture within cloud environments. In Computer Science Conference Proceedingshttps://doi.org/10.5121/csit.2019.90713
Evolution has always been a challenge for enterprise computing systems. The microservice based architecture is a new design model which is rapidly becoming one of the most eff...

NgramPOS: A Bigram-based Linguistic and Statistical Feature Process Model for Unstructured Text Classification

Journal Article
Yazdania, S., Tan, Z., Kakavand, M., & Lau, S. (in press)
NgramPOS: A Bigram-based Linguistic and Statistical Feature Process Model for Unstructured Text Classification. Wireless Networks, https://doi.org/10.1007/s11276-018-01909-0
Research in financial domain has shown that sentiment aspects of stock news have a profound impact on volume trades, volatility, stock prices and firm earnings. With the ever ...

Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm

Journal Article
Ambusaidi, M. A., He, X., Nanda, P., & Tan, Z. (2016)
Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm. IEEE Transactions on Computers, 65(10), 2986-2998. https://doi.org/10.1109/tc.2016.2519914
Redundant and irrelevant features in data have caused a long-term problem in network traffic classification. These features not only slow down the process of classification bu...

Detection of Denial-of-Service Attacks Based on Computer Vision Techniques

Journal Article
Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P., & Hu, J. (2015)
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques. IEEE Transactions on Computers, 64(9), 2519-2533. https://doi.org/10.1109/tc.2014.2375218
Detection of Denial-of-Service (DoS) attacks has attracted researchers since 1990s. A variety of detection systems has been proposed to achieve this task. Unlike the existing ...